D

Team-Fly    

  
Malicious Mobile Code: Virus Protection for Windows
By Roger A. Grimes
Slots : 1
Table of Contents


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

daily hack probes 
Dalnet  2nd 
dangerous executables 
Dark Avenger 
Dark Avenger virus 
Data Fellow 
data segment instruction pointers 
datafiles 
dates, checking 
DBLBUFF.SYS 
DBLSPACE.BIN  2nd 
DCC (Direct Client to Client) 
DDE (Dynamic Data Exchange) 
DDoS (distributed denial of service) 
de Vitry, David 
DEBUG.EXE  2nd  3rd  4th 
decompression  
decryption 
Deep Throat Trojan horse 
Deep ThroatTrojan horse 
DeepBO Trojan horse 
DeepThroat Trojan horse 
Def Con hacker convention 
default system shares 
defense plan, malicious mobile code
    communication, importance of 
    creating 
    deployment 
    distributing updates 
    end user education 
    foreign computers and networks 
    goals 
    implementation 
    management buy-in 
    new assets, protecting 
    objectives 
    quality assurance 
    team 
    technology inventory 
    testing 
    updating and reviewing  2nd 
    writing 
defense strategy, recommendations 
Define virus 
Delete.bat file 
Delphi 
Delta Trojan horse 
DeltaSource Trojan horse 
Den Zuk boot virus 
denial of service (DoS) attacks  2nd  3rd  4th 
Department of Defense 
Department of Energy 
Der Spaeher Trojan horse  2nd 
DESKTOP.INI 
destination port number 
device drivers  2nd  3rd  4th 
Devil Trojan horse 
DFS (Distributed File System) 
DHCP 
DHTML (Dynamic HTML) 
DHTML Edit control, ActiveX 
DHTMLED.OCX 
digital certificates  2nd 
digital copiers 
Digital Equipment Corporation 
digital fingerprint   2nd 
digital ID 
digital signature 
digital signing 
Digital VAX host email system 
DIR command 
DIR-2 virus 
direct action Trojan horses 
Direct Client to Client (DCC) 
disabling virus services 
Disk Manager 
Disk Quotas 
DISKDIAG.EXE 
DISKPROBE.EXE 
DISKSAVE.EXE 
distributed attacks 
distributed computing 
distributed denial of service (DDoS) 
Distributed File System (DFS) 
Distributed.net 
DLL (dynamic linking library) 
DNS (domain naming servers) 
DNS Spoofing 
Document.ExecCommand( ) 
documents, saving in rich text format 
Doly Trojan horse 
Domain Administrators 
Domain Name System (DNS) 
domain naming servers (DNS) 
domains 
DoS (denial of service) attacks 
DOS batch files 
DOS boot virus prefix (Boot) 
DOS command interpreters 
DOS computer viruses
    .EXE and .COM files 
    all Windows platforms, effect upon 
    boot viruses 
    detecting 
    file- infecting viruses 
    hardware manipulation 
    history 
    interrupts 
    memory-resident viruses 
    nonmemory resident viruses 
    PC boot sequence 
    programming skills required 
    protecting computers from 
    removing 
    Windows 3.x, interaction with 
    Windows 9x, interaction with 
    Windows NT, interaction with 
DOS error messages 
DOS Program Information files 
DOS Virtual Machine (DVM) 
DOS Virtual Machine (VM or DVM) 
DOSSTART.BAT  2nd  3rd 
dotless IP address exploit 
Doubleclick.net 
Download Demon 
Dr. Watson for Windows  2nd  3rd 
drive A booting, disabling 
drive A, booting from  2nd 
Driver Signing 
Driver Verifier 
DRIVES.BAT 
dropper programs 
droppers 
DRVSPACE.BIN  2nd 
DRWTSN32 
dual-boot partitions 
dual-boot systems 
Dump command 
DUNPassword Trojan horse 
DVM (DOS Virtual Machine) 
Dynamic Data Exchange (DDE) 
Dynamic HTML 
Dynamic HTML (DHTML) 
dynamic linking library (DLL) 
dynamic VxDs 


Team-Fly    
Top


Malicious Mobile Code. Virus Protection for Windows
Malicious Mobile Code: Virus Protection for Windows (OReilly Computer Security)
ISBN: 156592682X
EAN: 2147483647
Year: 2001
Pages: 176

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net